> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
> Behalf Of Philip Lavine
> Sent: Monday, September 25, 2006 11:50 PM
> To: nanog
> Subject: decline of customer service
>
>
> Times have changed,
>
> My experience has been recently that ISP's and ASP's hav
On Tue, Sep 26, 2006 at 01:41:52PM -0400, Patrick W. Gilmore wrote:
> For instance, how many networks are in full compliance with BCP38?
I've been working towards this on our network for some time
but have been hindered by vendor.. uhm, features^Wbugs. eg:
halving the TCAM with rpf enabl
On Sep 26, 2006, at 11:57 AM, Mark Kent wrote:
I asked:
Who among AS1239, AS701, AS3356, AS7018, AS209 does loose RPF
(not just strict RPF on single-homed customers)?
and Patrick answered:
I'm wondering why that is relevant.
It's relevant because it was suggested that loose RPF should be
I asked:
> Who among AS1239, AS701, AS3356, AS7018, AS209 does loose RPF
> (not just strict RPF on single-homed customers)?
and Patrick answered:
>> I'm wondering why that is relevant.
It's relevant because it was suggested that loose RPF should be a
"best common practice" so I was curious whic
My apologies to the list for my forward post from the DA list. I was wading
through nanog mail and simply not paying attention to subject tags when I
replied. Completely unintentional.
-b
--
sent from my blackberry (typing with thumbs)
Anshuman:
A good place to start for operational contacts is both the
puck.nether.net site and the www.peeringdb.com.
i found this: http://puck.nether.net/netops/nocs.cgi?ispname=comcast
and this:
(you can log in as a guest)...
https://www.peeringdb.com/private/participant_view.php?id=822
now go
At 10:06 25/09/2006, Ian Mason wrote:
One of the largest North American network providers filters/drops
ICMP messages so that they only pass those with a source IP
address that appears in their routing table.
This is clearly reasonable as part of an effort to mitigate ICMP
based network abuse
Dear Colleagues,
Following a request, this announcement is being sent to a few ops
focused mailing lists.
We are pleased to announce that we will be able to accept e-mailed
requests for assignments for anycasting DNS servers from 2 October
2006. The request form and supporting notes will be avail
At 21:55 08/09/2006, Jim Shankland wrote:
Travis Hassloch <[EMAIL PROTECTED]> writes:
> The part where it becomes a DoS is when they tie up all the listeners
> on a socket (e.g. apache), and nothing happens for several minutes until
> their connections time out. Whether intentional or not, it
Is here. Several companies are rehearsing their old products and
buzzwording them for DDoS mitigation or botnets, but not Trend Micro.
Trend Micro released a brand new product, implemented with the novel idea
of utilizing DNS to detect bots on an ISP or corporate network.
Whether by massive requ
On Monday, 2006-09-25 at 10:09 MST, Mark Kent <[EMAIL PROTECTED]>
wrote:
> Mark Smith replied with two paragraphs, but it's not 100% clear to me
> that he got the reason why I asked. I asked because his initial
statement
> boiled down to "numbering on un-announced space breaks PMTUD"...
> but
On Tue, Sep 26, 2006 at 12:17:27AM -0700, Tony Rall wrote:
>
> On Monday, 2006-09-25 at 10:09 MST, Mark Kent <[EMAIL PROTECTED]>
> wrote:
> > Mark Smith replied with two paragraphs, but it's not 100% clear to me
> > that he got the reason why I asked. I asked because his initial
> statement
>
First, I think that forwarding messages from a private list
is something that is frowned upon.
Secondly -- and speaking as a Trend employee and someone intimately
involved in the ICSS/BASE project -- we don't talk/play in the BGP
traffic stream. We simply reap potential target data from a
BGP/Ori
13 matches
Mail list logo